Bug 768087
Summary: | pam remember can check wrong username if it is a substring of another username | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Steve <smithsg> | |
Component: | pam | Assignee: | Tomas Mraz <tmraz> | |
Status: | CLOSED ERRATA | QA Contact: | Dalibor Pospíšil <dapospis> | |
Severity: | medium | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 5.7 | CC: | dspurek, mvadkert | |
Target Milestone: | rc | |||
Target Release: | --- | |||
Hardware: | i386 | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | pam-0.99.6.2-10.el5 | Doc Type: | Bug Fix | |
Doc Text: |
There was a bug in the user matching when looking old password entries in /etc/security/opasswd in the pam_unix and pam_cracklib modules when option remember is used.
Due to the bug users whose usernames were a substring of another username could get mixed up the old password entries with the another user.
The string matching of usernames was fixed so only exactly the same usernames are matched.
After the fix the old password entries of users are not mixed up anymore.
|
Story Points: | --- | |
Clone Of: | ||||
: | 815516 (view as bug list) | Environment: | ||
Last Closed: | 2013-01-08 07:15:57 UTC | Type: | --- | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: |
Description
Steve
2011-12-15 17:56:11 UTC
You can use pam_pwhistory instead of pam_unix remember feature. It is available in the current pam package in the Red Hat Enterprise Linux 5. For the bugfix request for remember feature of pam_unix please use the regular support channels http://www.redhat.com/support so the request can be properly prioritized. This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux release for currently deployed products. This request is not yet committed for inclusion in a release. Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: There was a bug in the user matching when looking old password entries in /etc/security/opasswd in the pam_unix module when option remember is used. Due to the bug users whose usernames were a substring of another username could get mixed up the old password entries with the another user. The string matching of usernames was fixed so only exactly the same usernames are matched. After the fix the old password entries of users are not mixed up anymore. Aargh - the test is right but the same repeated bug is also in pam_cracklib that is used in the password stack as well. I need to fix it there as well. Technical note updated. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. Diffed Contents: @@ -1,4 +1,4 @@ -There was a bug in the user matching when looking old password entries in /etc/security/opasswd in the pam_unix module when option remember is used. +There was a bug in the user matching when looking old password entries in /etc/security/opasswd in the pam_unix and pam_cracklib modules when option remember is used. Due to the bug users whose usernames were a substring of another username could get mixed up the old password entries with the another user. The string matching of usernames was fixed so only exactly the same usernames are matched. After the fix the old password entries of users are not mixed up anymore. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-0032.html |